• Title/Summary/Keyword: Internet store

Search Result 517, Processing Time 0.026 seconds

Multi-camera based Images through Feature Points Algorithm for HDR Panorama

  • Yeong, Jung-Ho
    • International journal of advanced smart convergence
    • /
    • v.4 no.2
    • /
    • pp.6-13
    • /
    • 2015
  • With the spread of various kinds of cameras such as digital cameras and DSLR and a growing interest in high-definition and high-resolution images, a method that synthesizes multiple images is being studied among various methods. High Dynamic Range (HDR) images store light exposure with even wider range of number than normal digital images. Therefore, it can store the intensity of light inherent in specific scenes expressed by light sources in real life quite accurately. This study suggests feature points synthesis algorithm to improve the performance of HDR panorama recognition method (algorithm) at recognition and coordination level through classifying the feature points for image recognition using more than one multi frames.

Smart Factory as a Set of Essential Technologies of 4th Industrial Revolution (4차 산업혁명 요소기술 집합체로써의 스마트팩토리)

  • Seo, Dayoon;Bae, Sung Min
    • Journal of Institute of Convergence Technology
    • /
    • v.7 no.2
    • /
    • pp.21-23
    • /
    • 2017
  • Smart Factories could be regarded as a result of the integration of various key technologies of the fourth industrial revolutions. In smart factory, the IoT (Internet of things) is applied to capture the data generated by the production facility, store and analyze data generated in real time using Big Data technology. In addition, 3D printers are used to print expensive and complex parts, industrial robots supply materials and parts to the production site, store finished products in warehouses. In this paper, we introduced the definition of smart factory and change of job market. Also, we summarize several national policies to support enhancing transformation process of smart factory.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

Consumer′s Perception and Buying Behavior through the Shopping Mall -Focused on the Customers of D Cyber Mall- (소비자의 인터넷 쇼핑몰 이용가치와 불안요소 인지 - D백화점 쇼핑몰 고객을 중심으로 -)

  • 홍성희;배미경;서동주
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.6
    • /
    • pp.69-83
    • /
    • 2002
  • This study examined the effects of demographic variables on buying behavior, and investigated buyers'perceived value and risk perception of the internet shopping mall. The sample was collected by a department store in Daegu, and it included 1,732 individuals using the Cyber Mall. Research methods used in this study were simple statistics, t-test and ANOVA. The buyers perceived values through the internet shopping mall were classified into five categories-price, time, convenience, intrinsic attributes, reliability and the risk perception also was classified such as the overall purchasing process, quality of products, exposure of the personal information, delivery system, refund and exchange. The major findings of this study were 1) most important categories affecting their buying behavior were the value of convenience and following values in order were time, price, reliability, intrinsic attributes. 2) the risk perception were overall purchasing behavior, quality of products, exposure of personal information, delivery, and refund & exchange in order. 3) age of buyers, buying experience on the internet shopping mall, and gender were the important factors affecting the buyers'perceived value and risk. 4) the study also, showed that according to the variety of products, buyers perceived the value and risk differently, for example, the price was the most important perceived value in case of food product. The implication of the study is to strategically suggest how to enhance the buyers'perceived value and diminish perceived risk of different products.

A Study on the Determinative Factors for On-line Consumer Satisfaction in Fashion Products - Focused on the Purchasing Experience and Future Purchasing Intention of Internet Fashion Products- (온라인 소비자의 패션제품 구매 만족도의 영향변인 연구 -인터넷 패션제품 이용경험과 구매의도를 중심으로-)

  • 이승민;구양숙
    • Journal of the Korean Home Economics Association
    • /
    • v.42 no.7
    • /
    • pp.103-118
    • /
    • 2004
  • The purpose of this study was to investigate the discriminative factors of on-line consumer satisfaction. Data were obtained from an online questionnaire survey with 1089 online shoppers who had the experience of either purchasing or visiting a fashion on-line shopping mall from the panel of an online survey agency(www.inr.co.kr) and 1049 responses were analyzed. For analysis of data, descriptive analysis, Cronbach's ${\alpha}$, $\chi$$^2$-test, one-wav ANOVA, Ducan test and stepwise regression analysis were applied. The results of this study were as follows: Firstly as a result of differences of purchasing experience and future purchasing intention via internet, 4 consumer groups were generated: internet patronizing group, trial and unsatisfied experience group, future purchasing intention group, and internet carelessness group. Secondly each group differences was found in demographic variables such as age, marital status, income and employment status. Croup differences were also found in personal, product, and store variables except tangibility. According to consumer groups, different factors were directly impact on consumer satisfaction.

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing (클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴)

  • Yin, XiaoChun;Thiranant, Non;Lee, HoonJae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.49-58
    • /
    • 2014
  • With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.

Shopping behavior, attitude and characteristics of internet clothing shoppers (인터넷 의류구매자의 의류쇼핑행동, 태도 및 특성)

  • 하오선;신혜원
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.25 no.1
    • /
    • pp.71-82
    • /
    • 2001
  • In this study, Internet users were separated into 3 groups(clothing shoppers, clothing non-shoppers, non-shoppers). Shopping behavior of clothing shoppers(those who used the internet channel for clothing shopping) and the attitude to internet clothing shopping were examined. And characteristics of clothing shoppers were compared with characteristics of clothing non-shoppers(those who purchased goods except clothing on internet) and non-shoppers(those who purchased nothing on internet). The reason why clothing non-shoppers and non-shoppers didnt purchase clothing on internet was also investigated. Questionaire was used as method of gathering data. Mean, ANOVA, Duncan-test, t-test and $\chi$$^2$-test were used for data analysis. 1. Clothing shoppers considered carefully design, exchange & refund, quality and price and purchased generally T-shirt, underwear, jeans and sports wear. 2. Clothing shoppers thought clothing in internet shopping malls was not various in item, design, color, size and price. But they were satisfied with shopping convenience. 3. Clothing shoppers were more conscious of the shopping cost compared with clothing non-shoppers and non-shoppers Recreational shopping orientations and fashion leader orientations were low in both groups. Self-confidence in connection with clothing purchase were high in each groups, but that of clothing shoppers were relatively higher than clothing non-shoppers and non-shoppers. 4. The reason why clothing non-shoppers and non-shoppers didnt purchase clothing in internet shopping malls was that they wanted to buy after trying on clothing in a store, didnt believe the quality of clothing, didnt need to purchase clothing in internet shopping malls, and worried about exchange & refund.

  • PDF

Color Strategies for SPA Brand Identity -Focused on 2013 S/S- (SPA 브랜드 아이덴티티를 위한 컬러 활용 전략 -2013년 S/S 시즌을 중심으로-)

  • Park, SYoojeong;Ha, Jisoo
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.5
    • /
    • pp.672-682
    • /
    • 2015
  • SPA brands have quickly expanded in domestic fashion markets as native SPA brands enter markets that foreign SPA brands previously occupied. It is important that each SPA brand establish its own brand identity to differentiate itself from other brands when SPA brand competition in fashion markets increases. This study investigates how SPA brands express brand identities through colors due to their importance for visualization strategies and brand identity. This study conducted a simultaneous literature study and case study. First, this study reviewed the theoretical background of brand identity and its relationship with colors as well as SPA brands by studying relevant literature and cases of domestic academic theses and data on Internet web sites. After reviewing the theoretical background of SPA brands, this study selected 4 stores of SPA brands (8SECONDS, H&M, UNIQLO, and ZARA) as case study targets and analyzed the stores' external appearance, interior and product colors. Store analysis divided colors into identity colors and trend colors with each SPA company expressing its own brand identity through: the store's external appearance (logo color), painted interior colors (ceiling, floor, walls, mannequins, hangers, equipment, and store-carrier bag), or trend colors (reflected in the store's main display hall or products). The results consider that each SPA brand sets the mass market as their target, and chooses the commercialization of latest fashion by selecting the latest trends in the fashion trend cycle, so its products do not reflect characteristics symbolizing the company's uniqueness and brand.

A Guidelines for Establishing Mobile App Management System in Military Environment - focus on military App store and verification system - (국방환경에서 모바일 앱 관리체계 구축방안 제시 - 국방 앱스토어 및 검증시스템 중심으로 -)

  • Lee, Gab-Jin;Goh, Sung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.525-532
    • /
    • 2013
  • Recently. smartphones have been popularized rapidly and now located deep in our daily life, providing a variety of services from banking, SNS (Social Network Service), and entertainment to smart-work mobile office through apps. Such smartphone apps can be easily downloaded from what is known as app store which, however, bears many security issues as software developers can just as easily upload to it. Military apps will be exposed to a myriad of security threats if distributed through internet-basis commercial app store. In order to mitigate such security concerns, this paper suggests a security guidelines for establishing a military-excusive app store and security verification system which prevent the security hazards that can occur during the process of development and distribution of military-use mobile apps.

Similar Trajectory Store Scheme for Efficient Store of Vehicle Historical Data (효율적인 차량 이력 데이터 저장을 위한 유사 궤적 저장 기법)

  • Kwak Ho-Young;Han Kyoung-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.114-125
    • /
    • 2006
  • Since wireless Internet services and small mobile communication devices come into wide use as well as the use of GPS is rapidly growing, researches on moving object, whose location information shifts sequently in accordance with time interval, are being carried out actively. Especially, the researches on vehicle moving object are applied to Advanced traveler information system, vehicle tracking system, and distribution transport system. These systems are very useful in searching previous positions, predicted future positions, the optimum course, and the shortest course of a vehicle by managing historical data of the vehicle movement. In addition, vehicle historical data are used for distribution transport plan and vehicle allocation. Vehicle historical data are stored at regular intervals, which can have a pattern. For example, a vehicle going repeatedly around a specific section follows a route very similar to another. If historical data of the vehicle with a repeated route course are stored at regular intervals, many redundant data occur, which result in much waste of storage. Therefore this thesis suggest a vehicle historical data store scheme for vehicles with a repeated route course using similar trajectory which efficiently store vehicle historical data.

  • PDF